Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacker's Delight (2nd Edition)
Hacker's Delight (2nd Edition)

In Hacker’s Delight, Second Edition, Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren’s hacks...

C by Dissection: The Essentials of C Programming
C by Dissection: The Essentials of C Programming

This significantly revised edition has been carefully designed to meet the needs of readers new to C. The reader moves easily through the fundamentals of C and on to its latest applications by means of a time-tested explanatory tool called dissection, first developed by the authors in 1984. Dissection, a pedagogical method similar to a...

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Essential Skills for the Agile Developer: A Guide to Better Programming and Design
Essential Skills for the Agile Developer: A Guide to Better Programming and Design

Agile has become today’s dominant software development paradigm, but agile methods remain difficult to measure and improve. Essential Skills for the Agile Developer fills this gap from the bottom up, teaching proven techniques for assessing and optimizing both individual and team agile practices.

...

C++ Primer (5th Edition)
C++ Primer (5th Edition)

Bestselling Programming Tutorial and Reference Completely Rewritten for the New C++11 Standard

Fully updated and recast for the newly released C++11 standard, this authoritative and comprehensive introduction to C++ will help you to learn the language fast, and to use it in modern, highly effective ways....

Introduction to the Design and Analysis of Algorithms (2nd Edition)
Introduction to the Design and Analysis of Algorithms (2nd Edition)

Based on a new classification of algorithm design techniques and a clear delineation of analysis methods, Introduction to the Design and Analysis of Algorithms, 2e presents the subject in a truly innovative manner.  Written in a reader-friendly style, the book encourages broad problem-solving skills while thoroughly covering the...

UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design (2nd Edition)
UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design (2nd Edition)

"This book manages to convey the practical use of UML 2 in clear and understandable terms with many examples and guidelines. Even for people not working with the Unified Process, the book is still of great use. UML 2 and the Unified Process, Second Edition is a must-read for every UML 2 beginner and a helpful guide and...

Syntactic Pattern Recognition: An Introduction (Applied Mathematics and Computation; No. 14)
Syntactic Pattern Recognition: An Introduction (Applied Mathematics and Computation; No. 14)
This book was written to provide students, engineers, and scientists involved in pattern recognition, digital image processing, and artificial intelligence with a comprehensive introduction to the concepts and tech- niques of syntactic pattern recognition.

Syntactic pattern recognition is concerned with the
...
CMMI for Acquisition: Guidelines for Improving the Acquisition of Products and Services (2nd Edition)
CMMI for Acquisition: Guidelines for Improving the Acquisition of Products and Services (2nd Edition)

CMMI® for Acquisition (CMMI-ACQ) describes best practices for the successful acquisition of products and services. Providing a practical framework for improving acquisition processes, CMMI-ACQ addresses the growing trend in business and government for organizations to purchase or outsource required products and...

Patterns for Time-Triggered Embedded Systems: Building Reliable Applications with the 8051 Family of Microcontrollers (with CD-ROM)
Patterns for Time-Triggered Embedded Systems: Building Reliable Applications with the 8051 Family of Microcontrollers (with CD-ROM)
Embedded software is ubiquitous. It forms a core component of an enormous range of systems, from aircraft, passenger cars and medical equipment, to children’s toys, video recorders and microwave ovens. This book provides a complete and coherent set of software patterns to support the development of this type of application. ...
Exploratory Software Testing: Tips, Tricks, Tours, and Techniques to Guide Test Design
Exploratory Software Testing: Tips, Tricks, Tours, and Techniques to Guide Test Design

How to Find and Fix the Killer Software Bugs that Evade Conventional Testing

 

In Exploratory Software Testing, renowned software testing expert James Whittaker reveals the real causes of today’s most serious, well-hidden software...

Software Development: Case Studies in Java
Software Development: Case Studies in Java

In order to be able to write good software, students will need to be familiar with a range of techniques; good programming practice, experience of problem solving, familiarity with development methodologies, and knowledge of software processes. This book takes a new approach to the teaching of software development. Using a collection of case...

Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy